Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Chapter 13 #5

Merged
merged 9 commits into from
Nov 22, 2022
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Next Next commit
Add Computer Waste and Mistakes
  • Loading branch information
Kayzels committed Nov 22, 2022
commit 3c7d622cb1767134d8c87b35c7d8f3e47a440f35
1 change: 1 addition & 0 deletions .vscode/ltex.hiddenFalsePositives.en-GB.txt
Original file line number Diff line number Diff line change
Expand Up @@ -18,3 +18,4 @@
{"rule":"MORFOLOGIK_RULE_EN_GB","sentence":"^\\QVendor ERP Solutions Apache Open For Business ERP Compiere Compiere Open Source ERP Openbravo Openbravo Open Source ERP WebERP\\E$"}
{"rule":"ENGLISH_WORD_REPEAT_RULE","sentence":"^\\QVendor ERP Solutions Apache Open For Business ERP Compiere Compiere Open Source ERP Openbravo Openbravo Open Source ERP WebERP WebERP\\E$"}
{"rule":"NON_STANDARD_WORD","sentence":"^\\QCardinality for a binary relationship can be one to one (1:1), one to many (1:M), or many to many (M:M).\\E$"}
{"rule":"ENGLISH_WORD_REPEAT_RULE","sentence":"^\\QData entry or data capture errors Errors in computer programs Errors in file handling Mishandling of computer output Inadequate planning for and control of equipment malfunctions Inadequate planning for and control of environmental difficulties Installing computer capacity inadequate for the level of activity on corporate websites Failure to provide access to the most current information, by not adding new URLs, and not deleting old URLs.\\E$"}
53 changes: 53 additions & 0 deletions units/part05/chapter13.tex
Original file line number Diff line number Diff line change
Expand Up @@ -5,5 +5,58 @@
\setcounter{chapter}{12}
\chapter{Security, Privacy and Ethical Issues in Information Systems}
\chaptermark{Security, Privacy and Ethics}
\section{Computer Waste and Mistakes}
\begin{definition}{Computer Waste}
The inappropriate use of computer technology and resources.

Includes employees wasting computer resources and time by playing games and surfing the web, sending unnecessary email, printing documents and other materials that is then not read, developing systems that are then not used to their full extent, and discarding old hardware that could be recycled. Junk email (\concept{spam}) is wasteful.

Waste is caused by the improper management of information systems and resources.
\end{definition}
\begin{definition}{Computer-Related Mistakes}
Errors, failures, and other computer problems that make computer output incorrect, or not useful, caused mostly by human error.

Can be caused by unclear expectations and a lack of feedback.
\end{definition}
\begin{sidenote}{Types of Computer-Related Mistakes}
\begin{itemize}[nosep]
\item Data entry or data capture errors
\item Errors in computer programs
\item Errors in file handling
\item Mishandling of computer output
\item Inadequate planning for and control of equipment malfunctions
\item Inadequate planning for and control of environmental difficulties
\item Installing computer capacity inadequate for the level of activity on corporate websites
\item Failure to provide access to the most current information, by not adding new URLs, and not deleting old URLs.
\end{itemize}
\end{sidenote}
\subsection{Preventing Computer-Related Waste and Mistakes}
\begin{enumerate}[nosep]
\item Establish policies and procedures
\item Implement policies and procedures
\item Monitor policies and procedures
\item Review policies and procedures
\end{enumerate}
\subsubsection{Establishing Policies and Procedures}
\begin{sidenote}{Preventing Waste}
Establish policies and procedures regarding efficient acquisition, use, and disposal of systems and devices.

Stringent policies on acquisition of computer systems and equipment, including a formal justification statement, the definition of standard computing platforms, and the use of preferred vendors for all acquisitions.
\end{sidenote}
\begin{sidenote}{Preventing Error}
\begin{itemize}[nosep]
\item Training programs for individuals and workgroups.
\item Manuals and documents on how computer systems are to be maintained and used.
\item Needing approvals for certain systems and applications before they are implemented and used, to ensure compatibility and cost-effectiveness
\item A requirement that documentation and descriptions of certain applications be submitted to a central office.
\end{itemize}
\end{sidenote}
\subsubsection{Implementing Policies and Procedures}
Varies according to the type of business. Typically focus on the implementation of source data automation, the use of data editing to ensure accuracy and completeness, and the assignment of responsibility for data accuracy within each information system.
\subsubsection{Monitoring Policies and Procedures}
Monitor routine practices, and take corrective action if necessary. Can be done using internal audits to measure actual results against established goals.
\subsubsection{Reviewing Policies and Procedures}
Determine whether the existing policies and procedures are adequate. Should allow companies to take a proactive approach.

\vbox{\rulechapterend}
\end{document}